Powered by RND
PodcastsTecnologiaThe OT and IoT Security Podcast
Ouça The OT and IoT Security Podcast na aplicação
Ouça The OT and IoT Security Podcast na aplicação
(1 200)(249 324)
Guardar rádio
Despertar
Sleeptimer

The OT and IoT Security Podcast

Podcast The OT and IoT Security Podcast
Nozomi Networks
Nozomi Networks security experts discuss topics that are important to the OT and IoT security community. This includes current cybersecurity threat intelligence...
Veja mais

Episódios Disponíveis

5 de 49
  • The Security Sandbox | Hello 2025: How Al, Zero Trust & Proactive Defense Are Shaping Cybersecurity's Future
    In this episode of The Security Sandbox, hosts Vivek Ponnada and Sandeep Lota will dive into the top cybersecurity trends that shaped 2024 and discuss our predictions for 2025, including:▶️ The impact of emerging technologies like AI on cybersecurity▶️ The latest trends in threat actor tactics targeting operational technology▶️ How zero trust initiatives are changing industrial network architecture▶️ The growing role of Secure by Design principles▶️ Upcoming regulations driving cybersecurity enhancements across industries▶️ Why proactive defense in OT environments will be a key initiative in 2025Visit Our WebsiteFollow Us on LinkedIn
    --------  
    29:44
  • The Security Sandbox at the ICS Cybersecurity Conference
    Hosts Vivek Ponnada and Sandeep Lota share their insights on and exploring topics such as: ✅ Emerging threats to ICS over the next 12-18 months✅ Evolving strategies for integrating IT and OT cybersecurity✅ The future role of AI in ICS cybersecurity✅ Fostering collaboration between IT and OT teamsVisit Our WebsiteFollow Us on LinkedIn
    --------  
    19:44
  • The Security Sandbox | Ensuring Operational Availability & Safety with Unified Cyber Threat Intelligence
    Most cybersecurity threats begin in IT systems. But as the lines between IT and OT continue to blur, these same threats have more and more opportunities to move closer to critical control systems. Having both visibility and context into what assets are most at risk across your operational environments is crucial for maintaining the safety and availability of these systems.In this episode of the Security Sandbox, we'll cover the strategic use of cyber threat intelligence (CTI) to safeguard critical infrastructure and industrial environments.You'll learn about:Integrating OT/IoT threat intelligence with traditional IT threat intelligence for a complete picture of the attack surfaceUsing asset context when acting on threat intelligence in OT systemsReal-world examples of successful proactive threat responseVisit Our WebsiteFollow Us on LinkedIn
    --------  
    32:31
  • The Security Sandbox | Modernizing Cyber Risk Management in OT
    Over the past decade, operational technology (OT) systems have become increasingly digitized and more vulnerable to cyber threats, making effective cyber risk management more crucial than ever. This session will explore the concept of cyber risk, defined as the potential for loss or harm to digital infrastructure, and how you can proactively apply the latest tools, trends and techniques to reduce cyber risk and enhance the resilience of your OT systems.We’ll cover:Different risk scoring approaches, like quantitative, qualitative, and hybrid models, which help organizations prioritize and address vulnerabilities. Emerging trends in cyber risk management, including the growing adoption of AI-driven analytics, automation, and integrated security frameworks. How technologies like artificial intelligence and advanced threat detection systems are reshaping how organizations mitigate risk in OT environments.Visit Our WebsiteFollow Us on LinkedIn
    --------  
    31:42
  • The Security Sandbox | Evolving Endpoint Security in OT
    Traditionally, operational technology (OT) operators have shied away from active monitoring methods, driven largely by concerns over system disruption and OEM vendor validation expectations. However, the tide appears to be turning. Over the past few years, we’ve seen mindsets evolving from relying on a 100% passive approach to embracing more active monitoring methods to get deeper asset context, including configuration information, log files, user activity correlation, USB insertions, and even operational data from level 0 in a PLC.During this session, we'll delve into the advancements in OT-safe proactive monitoring and how you could apply some of these latest developments towards securing your critical infrastructure while ensuring operational continuity and compliance.Visit Our WebsiteFollow Us on LinkedIn
    --------  
    31:23

Mais podcasts de Tecnologia

Sobre The OT and IoT Security Podcast

Site de podcast

Ouça The OT and IoT Security Podcast, Hipsters Ponto Tech e muitos outros podcasts de todo o mundo com o aplicativo o radio.net

Obtenha o aplicativo gratuito radio.net

  • Guardar rádios e podcasts favoritos
  • Transmissão via Wi-Fi ou Bluetooth
  • Carplay & Android Audo compatìvel
  • E ainda mais funções
Radio
Aplicações
Social
v6.30.1 | © 2007-2024 radio.de GmbH
Generated: 12/6/2024 - 1:32:13 PM